GLORIA

GEOMAR Library Ocean Research Information Access

feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Keywords: E-business. ; Electronic commerce. ; E-commerce. ; Sustainable development. ; Study Skills. ; Educational technology. ; Ecosystems.
    Description / Table of Contents: Digitization of Financial Markets: A Literature Review on White-collar crimes -- Intervention of Chatbots –Recruitment Made Easy!!!! -- Affecting attributes to use food ordering app by young consumers -- Exploring influencing factors for m payment apps uses in the Indian context -- Modelling Enablers of Customer-Centricity in Convenience Food Retail -- Emotion AI: Integrating Emotional Intelligence with Artificial Intelligence in the digital workplace -- Factors affecting online grocery shopping in Indian culture -- A Study on Role of Digital Technologies & Employee Experience -- Driving employee engagement in today’s dynamic workplace: A literature review -- Is Online Teaching Learning Process An Effective Tool For Academic Advancement.
    Type of Medium: Online Resource
    Pages: 1 Online-Ressource(X, 474 p. 297 illus., 211 illus. in color.)
    Edition: 1st ed. 2021.
    ISBN: 9783030662189
    Series Statement: Advances in Science, Technology & Innovation, IEREK Interdisciplinary Series for Sustainable Development
    Language: English
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Singapore :Springer Singapore Pte. Limited,
    Keywords: Energy conservation. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (359 pages)
    Edition: 1st ed.
    ISBN: 9789811373992
    Series Statement: Studies in Systems, Decision and Control Series ; v.206
    DDC: 333.79
    Language: English
    Note: Intro -- Preface -- Contents -- About the Editors -- The Rudiments of Energy Conservation and IoT -- 1 Introduction -- 2 Paradigmatic View of Energy-Efficient IoT -- 3 Pragmatic Energy-Efficient IoT System Architecture -- 4 Issues of Energy Conservation in IoT -- 5 Energy Conservation Approaches for IoT Devices and Its Perspectives -- 5.1 Node Activity Management -- 5.2 Data Aggregation and Transmission Process -- 5.3 Media Access Control (MAC) Protocol -- 5.4 Security Management -- 5.5 Topology Management -- 5.6 Routing -- 6 Energy-Efficient System Design for IoT Devices -- 7 Conclusions -- References -- Existing Enabling Technologies and Solutions for Energy Management in IoT -- 1 Introduction -- 2 Architectures of IoT -- 2.1 Three-Layer Architecture -- 2.2 Four Layer Architecture -- 2.3 Five-Layer Architecture -- 3 Components of IoT -- 3.1 Identification -- 3.2 Sensing -- 3.3 Communication -- 3.4 Computation -- 3.5 Services -- 3.6 Semantics -- 4 Applications -- 4.1 Home Automation -- 4.2 Health care -- 4.3 Transportation -- 4.4 Logistics -- 4.5 Smart Environment and Agriculture -- 5 Challenges in IoT -- 6 Energy Management -- 6.1 Energy Harvesting -- 6.2 Energy Conservation -- 7 Research Directions -- 8 Conclusion -- References -- Energy-Efficient System Design for Internet of Things (IoT) Devices -- 1 Introduction -- 2 Operation -- 3 Energy Conservation -- 3.1 Solar Energy Harvesting -- 3.2 Thermal Energy Harvesting -- 3.3 Vibrational Energy Harvesting -- 3.4 Electrostatic Energy Harvesting -- 3.5 Wind Energy Harvesting -- 3.6 RF Energy Harvesting -- 4 Harvesting Module -- 4.1 Rectenna Model -- 4.2 Sensing Antenna -- 4.3 DC-DC Converter -- 4.4 Power Management Unit -- 5 Wireless Energy Harvesting -- 5.1 Near Field Communication -- 5.2 Inductive Coupling -- 6 Applications -- 6.1 Home Appliances -- 6.2 Healthcare Devices. , 6.3 Automatic Vehicles -- 6.4 Business Infrastructure -- 6.5 Farming and Poultry -- 6.6 Smart Utilities -- References -- Models and Algorithms for Energy Conservation in Internet of Things -- 1 Introduction -- 2 Data Centers -- 2.1 Big Data -- 2.2 Cloud Computing -- 3 Virtualization -- 4 Load Balancing -- 4.1 Hardware Versus Software Load Balancing -- 5 Energy Consumptions in Data Centers -- 5.1 Green Computing -- 5.2 Power Calculation at Data Center -- 6 Static Energy-Efficient Algorithms -- 6.1 Exact Allocation Algorithm -- 6.2 Best Fit Heuristic Algorithm -- 7 Dynamic Energy-Efficient Algorithms -- 7.1 Hardware Level Solution -- 7.2 Software Level Solution -- 8 Summary -- References -- An Energy-Efficient IoT Group-Based Architecture for Smart Cities -- 1 Introduction -- 2 Related Work -- 3 System Description -- 3.1 The WSN for e-Health and Human Well-Being Monitoring -- 3.2 Utilities Monitoring Systems -- 3.3 Air Quality and Climate Monitoring Systems -- 3.4 Emergency Situations Monitoring -- 3.5 Other Systems -- 4 Proposed Architecture for the Smart City -- 5 Conclusion and Future Work -- References -- Context-Aware Automation Based Energy Conservation Techniques for IoT Ecosystem -- 1 Introduction -- 1.1 Communication Technologies -- 1.2 Pricing Policies -- 2 Introduction -- 3 Related Work -- 3.1 Demand-Side Management -- 3.2 Usage of Renewable Energy Source -- 3.3 Context-Aware Automation -- 3.4 Feedback-Based Automation -- 4 Case Studies -- 5 Proposed Framework -- 6 Future Directions and Challenges -- 7 Conclusion -- References -- Energy Conservation in IoT-Based Smart Home and Its Automation -- 1 Introduction -- 2 Electrical Network End-to-End System -- 2.1 Generation -- 2.2 Transmission and Distribution -- 2.3 Automation in Demand, Supply, and Monitoring -- 2.4 Load Shedding and Control -- 3 Causes of Energy Losses and Preventive Actions. , 3.1 Electrical Network Improvement -- 3.2 Smart Energy Monitoring Devices -- 4 Automation and Control in Electrical Network -- 4.1 Automation Devices -- 4.2 Standards for Automation Devices -- 4.3 Communication Hardware and Automation Protocols -- 5 Energy Conservation Key Area -- 5.1 Smart Buildings -- 5.2 Smart Homes -- 5.3 Smart Appliances -- 6 Energy Conservation in Smart Home and IoT -- 6.1 Automation and Sensors in Smart Home -- 6.2 Industry Trends and Present Technology -- 6.3 Energy Conservation Components of Smart Home -- 6.4 Renewable Energy Sources with IoT in Smart Home -- 7 Artificial Intelligence in Energy Conservation-Methods and Technology -- 7.1 Digital Signal Processing and IoT -- 7.2 Artificial Intelligence in Smart Home -- 8 Cloud Data Processing Using IoT Devices -- 9 Conclusions -- References -- IoT Architecture for Preventive Energy Conservation of Smart Buildings -- 1 Introduction -- 1.1 Prevalent Smart Components -- 1.2 IoT System Architectures -- 1.3 Smart Buildings -- 1.4 Energy Efficiency in Smart Building IoT Systems -- 2 Requirements and Approaches for Energy Efficiency in Smart Buildings -- 2.1 Requirements for Environmental Conservation -- 2.2 Requirement for Energy Modeling -- 2.3 Requirement for Energy Consumption Monitoring and Evaluation -- 3 Existing Application Architectures -- 3.1 Smart Energy Metering Architectures -- 3.2 Smart Lighting Architectures -- 3.3 Energy Management Interfaces for Buildings -- 3.4 Energy-Efficient Smart Building Automation Architectures -- 3.5 Energy-Efficient Implementations in Smart Grid -- 3.6 Energy-Efficient Comfort Management Systems in Smart Buildings -- 3.7 Energy Monitoring and Saving Methods in Smart Buildings -- 4 Open Challenges and Future Work -- 4.1 Lack of Interoperability for Currently Used Protocols -- 4.2 Need for a Cost-Effective Architecture that Conserves Energy. , 4.3 Integration of Renewable Energy Sources in Smart Buildings -- 4.4 Maintainability of Energy-Efficient Architectures -- 5 Conclusion -- References -- Designing Energy-Efficient IoT-Based Intelligent Transport System: Need, Architecture, Characteristics, Challenges, and Applications -- 1 Introduction -- 1.1 Intelligent Transport System -- 1.2 Motivations for IoT in Transportation -- 1.3 Architecture of ITS -- 2 Key Technologies and Related Power Optimization Bottlenecks -- 2.1 Perception Technology: Precision, Reliability, and Power Constraints -- 2.2 Communication Technology and Related Power Issues -- 2.3 Information Extraction and Underlying Power Issues -- 3 Energy Efficiency Challenges and Corresponding Solutions -- 3.1 Precision, Density, and Reliability of Perception and Smart Sensing Solutions -- 3.2 Information Exchange Based Solutions -- 3.3 Computational Feasibility and Distributed Computing Solutions -- 3.4 Data Collection and Pooling with Energy-Efficient Solutions -- 4 Further Challenges and Opportunities -- 4.1 Further Involvement of Internet of Vehicle (IoV) -- 4.2 Cooperative Automated Vehicle (CAV) Scheme -- 4.3 Utilization of Multiple-Source Data in ITS -- 4.4 Software-Defined Radio (SDR)-Based Communication -- 4.5 Energy Harvesting Corridors -- 5 Conclusion and Future Work -- References -- Capacity Estimation of Electric Vehicle Aggregator for Ancillary Services to the Grid -- 1 Historical Perspective -- 2 Development of Electric Vehicles -- 3 Motivation for Vehicle to Everything (V2X) and V2G Technology -- 4 Electric Vehicles and Solar Power Plants in Smart Grid Environment -- 5 Potential of EV to Grid Connection -- 6 Capacity Estimation of Aggregator -- 7 Battery Management System -- 8 Grid Connection and Performance Testing of V2G -- 9 Commercial Value of V2G -- 10 Challenges and Opportunities -- 11 Discussion and Conclusion. , References -- Need and Design of Smart and Secure Energy-Efficient IoT-Based Healthcare Framework -- 1 Introduction -- 2 Data Generation in IoT Environment -- 3 Applications of IoT -- 4 Publication Trends of IoT -- 5 Critical Human Disorders -- 6 Energy-Efficient IoT Systems (Related Works) -- 7 Role of IoT in Designing Energy-Optimized Systems -- 7.1 Proposed Energy-Efficient IoT-Based Healthcare System for Neurological and Psychological Disorder Patients -- 8 Conclusion -- References -- Medical Information Processing Using Smartphone Under IoT Framework -- 1 Introduction -- 1.1 Motivation -- 1.2 Objectives -- 1.3 Organization of the Chapter -- 2 System Model -- 3 System Requirement -- 4 Importance of Cloud for Smartphone-Enabled IoT -- 5 Internet of Medical Things (IoMT) Using Smartphone -- 6 Biomedical Data Processing -- 6.1 Transmission of Medical Image Signals -- 6.2 Transmission of Biomedical Signals (ECG, EEG, and EMG) -- 6.3 Transmission of Medical Video Signals -- 6.4 Teletrauma System -- 7 Application of IoT -- 7.1 Application Oriented to Health Care -- 8 Application Standards/Protocols Use in IoT (Health Care) -- 9 Challenges -- 10 Conclusion -- References -- Contributing Toward Green IoT: An Awareness-Based Approach -- 1 Introduction -- 2 A Walkthrough of Internets of Things and Its Applications -- 2.1 Challenges of Internet of Things -- 3 Green IoT: An Overview -- 3.1 Smart Homes -- 3.2 Smart Cities -- 3.3 Energy-Efficient Smart Health Care -- 4 Various Approaches to Achieve Green IoT -- 5 Awareness-Based Approach Toward Green IoT -- 5.1 Energy Awareness Campaigns -- 5.2 IoT-Based Smart Metering -- 5.3 Promoting Recycling -- 5.4 Creating Awareness About Green Information Communication Technology -- 5.5 Promoting the Usage of Sensor Cloud: A Step Toward Green IoT. , 6 Creating Awareness Through Prototyping: A Green IoT-Based Smart Home Model.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Singapore :Springer,
    Keywords: Computer security. ; Electronic books.
    Type of Medium: Online Resource
    Pages: 1 online resource (183 pages)
    Edition: 1st ed.
    ISBN: 9789811665974
    Series Statement: Studies in Computational Intelligence Series ; v.995
    Language: English
    Note: Intro -- Preface -- Contents -- About the Authors -- 1 Introduction to Cybersecurity -- 1 Introduction to Cybersecurity -- 1.1 Introduction -- 1.2 The Necessity of Cybersecurity -- 1.3 Cybersecurity and Ethics -- 2 Domains of Cybersecurity -- 3 Threats and Actors -- 3.1 Threats in Cyberspace -- 3.2 Types of Threats -- 3.3 Threat Actors and Types of Threat Actors -- 4 Recent Attacks -- 5 Awareness of Cybersecurity in Educational System -- 6 The Outline of the Book -- References -- 2 Being Hidden and Anonymous -- 1 Introduction -- 1.1 The Need for Anonymity -- 2 The Onion Router -- 3 Invisible Internet Project (IIP or I2P) -- 3.1 Working of I2P -- 4 Freenet -- 5 Java Anon Proxy (JAP) -- 6 Summary -- References -- 3 TOR-The Onion Router -- 1 Introduction -- 2 TOR-The Onion Router -- 2.1 Onion Routing -- 3 TOR Browser Installation -- 4 TOR Entities -- 5 TOR Status -- 6 TOR for Mobile-Orbot -- 7 Loopholes in TOR -- 8 What not to Use in TOR -- References -- 4 DarkNet and Hidden Services -- 1 Introduction -- 2 TOR and Its Hidden Service -- 3 Essential Concepts of TOR Hidden Services -- 4 Installation of Hidden Service in Linux -- 5 Countermeasures to Secure Your Own Hidden Service -- References -- 5 Introduction to Digital Forensics -- 1 Introduction to Forensics -- 2 Cyberforensic Process -- 3 Different Artifacts and Forensic Tools -- 3.1 Autopsy -- 3.2 DumpIt -- 3.3 Belkasoft Live RAM Capturer -- 4 Artifacts Gathering -- 4.1 Browser Artifacts -- 4.2 Registry Artifacts -- 4.3 Bulk Extractor -- 5 Network Forensics -- 5.1 ARP Cache Poisoning -- 5.2 Port Mirroring -- 5.3 Flooding -- 5.4 Dynamic Host Control Protocol (DHCP) Redirection -- 5.5 Detection of TOR Traffic in the Captured Traffic -- 6 Conclusion -- References -- 6 Intrusion Detection Systems Fundamentals -- 1 Introduction to Intrusion Detection System -- 2 Techniques to Combat Cyberthreats. , 2.1 Firewall -- 2.2 Authentication -- 2.3 Authorization -- 2.4 Encryption -- 2.5 Intrusion Detection System -- 3 Network-Based Intrusion Detection System (NIDS) -- 4 Host-Based Intrusion Detection System (HIDS) -- 5 Distributed Intrusion Detection System (DIDS) -- 5.1 Signature-Based Analysis -- 5.2 Anomaly-Based Analysis -- 6 Snort-Network-Based Intrusion Detection System -- 6.1 Additional Snort Add-Ons -- 6.2 Installation of Snort in Linux -- 6.3 Snort Rules -- 6.4 Rule Header -- 6.5 Rules Options -- 7 Open-Source Host-Based Intrusion Detection System (OSSEC) -- 7.1 Installation of OSSEC in Linux -- 8 Summary -- References -- 7 Introduction to Malware Analysis -- 1 Introduction of Malware -- 2 Types of Malware -- 3 Malware Symptoms -- 4 Need of Malware Analysis and Spreading Mechanism -- 4.1 Need for Malware Analysis -- 4.2 Malware Spreading Mechanism -- 5 Malware Analysis Prerequisites -- 6 Malware Analysis Environment -- 7 Malware Detection System and Analysis -- 7.1 Malware Detection -- 7.2 Malware Analysis -- 8 Conclusion -- References -- 8 Design of a Virtual Cybersecurity Lab -- 1 Introduction of Cybersecurity -- 2 Tools for Cybersecurity -- 3 Virtualization for Cybersecurity -- 4 Installation and Configuration of VMWare Workstation -- 5 Network Modes in Virtual Machines -- 6 Cybersecurity and Various Attacks -- 7 Defense Strategies Against Various Attacks -- 8 Case Study on Website Attacks -- 9 Conclusion -- References -- 9 Importance of Cyberlaw -- 1 Introduction -- 2 Why Cyberlaw is Necessary -- 3 Global Landscape of Cyberlaw -- 4 Cybercrimes -- 4.1 Categories of Cybercrime -- 4.2 Types of Cybercrime -- 5 Conclusion -- References.
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...